Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


The NSA’s Secret Role in the U.S. Assassination Program
2014-02-10, The Intercept (With Glenn Greenwald)
Posted: 2014-02-16 16:07:45
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.

Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.


NSA monitored US law firm and overseas client
2014-02-16, Boston Globe/New York Times
Posted: 2014-02-16 16:05:14
http://www.bostonglobe.com/news/nation/2014/02/16/eavesdropping-ensnared-law-...

The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: US lawyers. A top-secret document, obtained by former NSA contractor Edward J. Snowden, shows that a US law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance of Americans ensnared by the eavesdroppers and is of particular interest because US lawyers with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. The NSA’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the US law firm, and offered to share information. The NSA is banned from targeting Americans, including businesses, law firms, and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the NSA does not use spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada, and New Zealand — to skirt the law. The Australians told officials at an NSA liaison office in Canberra, that “information covered by attorney-client privilege may be included” in the intelligence gathering. Most attorney-client conversations do not get special protections under US law from NSA eavesdropping.

Note: For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.


New surveillance technology can track everyone in an area for several hours at a time
2014-02-05, Washington Post
Posted: 2014-02-11 08:45:17
http://www.washingtonpost.com/business/technology/new-surveillance-technology...

From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.

Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.


Intel officials believe Snowden has 'doomsday' cache
2013-11-26, MSN/Reuters
Posted: 2014-02-11 08:44:00
http://news.msn.com/us/intel-officials-believe-snowden-has-doomsday-cache

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Foie Gras Fracas: Haute Cuisine Meets The Duck Liberators
2003-03-09, New York Times
Posted: 2014-02-11 08:42:48
http://www.nytimes.com/2003/09/24/dining/foie-gras-fracas-haute-cuisine-meets...

Last month, Sonoma Saveurs [restaurant] was spray-painted and flooded by vandals because of a delicacy that will appear on its menu and in its store: foie gras, the fat-engorged liver of force-fed ducks and geese. Connoisseurs consider foie gras the epitome of culinary civilization. But animal rights activists who claimed responsibility for the destruction ... call foie gras the ''delicacy of despair,'' born of cruelty to animals. The Federal Bureau of Investigation called the attacks here acts of ''domestic terrorism.'' With its associations of gastronomic elitism -- foie gras retails for around $20 to $25 a quarter-pound -- its production has long been high on the hit list of animal protectionists. Israel, the world's fourth-largest supplier of goose foie gras, recently banned the force-feeding of geese and ducks, as have Denmark, Norway, Poland, Austria and Germany, all after pressure by animal rights activists. Switzerland and the United Kingdom now discourage its production, said Paul Waldau, a clinical assistant professor at the Center for Animals and Public Policy at Tufts University. Organizations like In Defense of Animals and People for the Ethical Treatment of Animals contend force-feeding is inherently inhumane. ''Migratory fat bears no resemblance whatsoever to ramming a pipe down ducks' necks, pumping pounds of corn mash down their gullets and distending their livers,'' said Ingrid Newkirk, the president of PETA. ''These geese and ducks can't fly up the garden path, let alone migrate.''

Note: For a more recent article on how those taking action to defend ducks have been officially labelled terrorists, click here. For a six-minute video showing the incredible cruelty being inflicted on these animals, click here.


Snowden: NSA conducts industrial espionage too
2014-01-26, CBS News/Reuters
Posted: 2014-02-03 11:00:20
http://www.cbsnews.com/news/snowden-nsa-conducts-industrial-espionage-too/

The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Watchdog Report Says N.S.A. Program Is Illegal and Should End
2014-01-23, New York Times
Posted: 2014-01-28 10:19:03
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-progra...

An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.

Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.


The hidden history of the CIA’s prison in Poland
2014-01-23, Washington Post
Posted: 2014-01-28 10:05:02
http://www.washingtonpost.com/world/national-security/the-hidden-history-of-t...

In early 2003, two senior CIA officers arrived at the U.S. Embassy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The Americans and Poles then sealed an agreement that over the previous weeks had allowed the CIA the use of a secret prison — a remote villa in the Polish lake district — to interrogate al-Qaeda suspects. The Polish intelligence service received the money, and the CIA had a solid location for its newest covert operation, according to former agency officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the CIA’s “black sites,” or secret prisons. The CIA prison in Poland was arguably the most important of all the black sites created by the agency after the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. In December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally. “In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law,” said Amrit Singh, a lawyer with the Open Society Justice Initiative.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
Posted: 2014-01-20 10:36:45
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
Posted: 2014-01-20 10:31:58
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
Posted: 2014-01-20 10:30:26
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


A Miami police informant, a prophetic racist and fresh questions about JFK’s death
2013-11-15, Miami Herald
Posted: 2014-01-20 10:28:22
http://www.miamiherald.com/2013/11/15/3756229/a-miami-police-informant-a-prop...

[Thirteen] days before that dark day in Dallas, [police informant Willie Augustus] Somersett elicited a chilling, police tape-recorded threat from a right-wing racist who talked of how the President would soon be shot “from an office building with a high-powered rifle” and how “they’ll pick up somebody within hours after…just to throw the public off.” Extremist Joseph A. Milteer, of Quitman, Ga., made the threat against Kennedy in the kitchen of Somersett’s small apartment in downtown Miami. In the late 1970s, the House Assassinations Committee had experts analyze a photograph taken in Dealey Plaza moments before the first shot of an unidentified motorcade spectator “who bears a strong resemblance” to Milteer. The experts, however, concluded the man was not Milteer, who died in 1974. But now, a retired FBI agent who says that within hours of the assassination he was assigned to locate Milteer has [said] the man in the photograph is indeed Milteer. “I stood next to the man. I interviewed him and spent hours with him,” said Don Adams, who spent 20 years with the FBI before working as a police chief in Ohio. “There is no question in my mind. As soon as I saw that picture I almost fell off of my feet.” Congressional investigators never contacted Adams. Adams, now 82, says he saw the Dealey Plaza photograph for the first time a decade after his 1982 retirement from the FBI. The photograph renewed his interest in the case and ultimately led him to write the book, From an Office Building with a High-Powered Rifle. His insider’s account raises disturbing questions about the FBI’s investigation of Kennedy’s death.

Note: To watch a five-minute video of 20-year FBI agent Don Adams stating he has no doubt there was a major cover-up of the JFK assassination, click here. For more excellent, revealing videos on the assassination, click here and here. For more on the JFK assassination, see the deeply revealing reports from reliable major media sources available here.


Burglars Who Took On F.B.I. Abandon Shadows
2014-01-07, New York Times
Posted: 2014-01-13 16:19:46
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows...

On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.

Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Exclusive: FBI allowed informants to commit 5,600 crimes
2013-08-04, USA Today
Posted: 2014-01-13 16:18:00
http://www.usatoday.com/story/news/nation/2013/08/04/fbi-informant-crimes-rep...

The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.

Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Agent: FBI key in border agent Terry slaying
2013-12-26, Arizona Republic (AZ's leading newspaper)
Posted: 2014-01-13 16:16:35
http://www.azcentral.com/news/articles/20131226fast-furious-agent-terry-killi...

A federal agent who exposed the Justice Departments flawed gun-trafficking investigation known as Operation Fast and Furious says the FBI played a key role in events leading to the 2010 murder near Nogales, Ariz., of U.S. Border Patrol Agent Brian Terry. John Dodson, a special agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives, contends that the bandits who killed Terry were working for FBI operatives and were sent to the border to do a drug rip-off using intelligence from the federal Drug Enforcement Administration. I dont think the (FBI) assets were part of the rip-off crew, Dodson said. I think they were directing the rip crew. Dodsons comments to The Arizona Republic amplify assertions he made in his recently released book, The Unarmed Truth, about his role as a whistle-blower in the Fast and Furious debacle. In his book, Dodson uses cautious language to characterize his account of circumstances surrounding Terrys death, saying the information is based on firsthand knowledge, personal opinion and press reports. He asserts that the DEA had information about, and may have orchestrated, a large drug shipment through Peck Canyon that December night. He alleges that DEA agents shared that intelligence with FBI counterparts, who advised criminal informants from another cartel that the load would be theirs for the taking. Stealing such a shipment would increase the clout of the FBI informants in the cartel organization they had penetrated, Dodson wrote, and thus lead to better intel for them in the future.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


The WikiLeaks Mole
2014-01-06, Rolling Stone
Posted: 2014-01-13 16:15:00
http://www.rollingstone.com/politics/news/the-wikileaks-mole-20140106

Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


C.I.A.: Maker of Policy, or Tool?
1966-04-25, New York Times
Posted: 2014-01-13 16:08:39
http://select.nytimes.com/gst/abstract.html?res=FB0A15FA3D5D137B93C7AB178FD85...

[Many questions] have dogged the [CIA] for years. This secret body [is] known to have overthrown governments and installed others, raised armies, staged an invasion of Cuba, spied and counterspied, established airlines, radio stations and schools. Was it in fact damaging, while it sought to advance, the national interest? Former President Truman, whose administration established the CIA in 1947, said In 1963 that by then he saw "something about the way the CIA has been functioning that is casting a shadow over our historic positions." President Kennedy, as the enormity of the Bay of Pigs disaster came home to him, said to one of the highest officials of his administration that he wanted "to splinter the CIA in a thousand pieces and scatter it to the winds." In the 19 years that the CIA has been in existence, 150 resolutions for tighter congressional control have been introduced - and put aside. Few persons in or out of the American Government know much about its work, its organization, its supervision or its relationship to the other arms of the executive branch. In 1960, CIA agents in Laos, disguised as "military advisers," stuffed ballot boxes and engineered local uprisings to help a hand-picked strongman ... set up a "pro-American" government. It was the CIA that built up Ngo Dinh Diem as the pro-American head of South Vietnam after the French ... had found him in a monastery cell in Belgium and brought him back to Saigon as Premier. The revelation that CIA agents served among Michigan State University scholars in South Vietnam from 1955 to 1959 has contributed to the fear [of infiltration of universities].

Note: For a longer, even more revealing summary of this very lengthy article, click here. To see a full copy of this article, click here. For more on the secret and illegal activities of major intelligence agencies, see the deeply revealing reports from reliable major media sources available here.


I worked on the US drone program. The public should know what really goes on
2013-12-29, The Guardian (One of the UK's leading newspapers)
Posted: 2014-01-06 16:10:40
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military

Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.

Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


The FBI COINTELPRO Program and the Fred Hampton Assassination
2013-12-03, Huffington Post
Posted: 2014-01-06 16:08:58
http://www.huffingtonpost.com/g-flint-taylor/the-fbi-cointelpro-progra_b_4375...

On December 4th it [was exactly] 44 years since a select unit of 14 Chicago Police officers, on special assignment to Cook County State's Attorney Edward Hanrahan, executed a pre-dawn raid on a west side apartment that left Illinois Black Panther Party leaders Fred Hampton and Mark Clark dead, several other young Panthers wounded, and the seven raid survivors arrested on bogus attempted murder charges. The physical evidence soon exposed the claims of a "shootout" that were made by Hanrahan and his men to be blatant lies, and that the murderous reality was that the police fired nearly 100 shots while the Panthers fired but one. But those lies were only the first layer of a massive cover-up that was dismantled and exposed over the next eight years -- a cover-up designed to suppress the central role of the Federal Bureau of Investigation and its COINTELPRO program in the assassination. The first documentation [of the operation and its cover-up] surfaced in March of 1971 when the Citizens Commission to Investigate the FBI broke into a small FBI office in Media Pennsylvania and expropriated over 1000 FBI documents. These documents exposed the FBI's super-secret and profoundly illegal COINTELPRO program and its focus in the 1960s on the black liberation movement and its leaders. Citing the assassinated Malcolm X as an example, Hoover directed all of the Bureau's Offices to "expose, disrupt, misdirect, discredit, and otherwise neutralize" African American organizations and leaders.

Note: For more on the realities of intelligence agency activity, see the deeply revealing reports from reliable major media sources available here.


The Soviet Union Spent $1 Billion On Mind-Control Experiments During The Cold War As Part Of Arms Race With The US: Report
2013-12-16, International Business Times
Posted: 2014-01-06 16:07:36
http://www.ibtimes.com/soviet-union-spent-1-billion-mind-control-experiments-...

The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.

Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"